a08ccbffa7
* Port awskms autoseal * Rename files * WIP autoseal * Fix protobuf conflict * Expose some structs to properly allow encrypting stored keys * Update awskms with the latest changes * Add KeyGuard implementation to abstract encryption/decryption of keys * Fully decouple seal.Access implementations from sealwrap structs * Add extra line to proto files, comment update * Update seal_access_entry.go * govendor sync * Add endpoint info to configureAWSKMSSeal * Update comment * Refactor structs * Update make proto * Remove remove KeyGuard, move encrypt/decrypt to autoSeal * Add rest of seals, update VerifyRecoveryKeys, add deps * Fix some merge conflicts via govendor updates * Rename SealWrapEntry to EncryptedBlobInfo * Remove barrier type upgrade check in oss * Add key to EncryptedBlobInfo proto * Update barrierTypeUpgradeCheck signature
222 lines
7.8 KiB
Go
222 lines
7.8 KiB
Go
// Code generated by protoc-gen-go. DO NOT EDIT.
|
|
// source: physical/types.proto
|
|
|
|
package physical
|
|
|
|
import (
|
|
fmt "fmt"
|
|
proto "github.com/golang/protobuf/proto"
|
|
math "math"
|
|
)
|
|
|
|
// Reference imports to suppress errors if they are not otherwise used.
|
|
var _ = proto.Marshal
|
|
var _ = fmt.Errorf
|
|
var _ = math.Inf
|
|
|
|
// This is a compile-time assertion to ensure that this generated file
|
|
// is compatible with the proto package it is being compiled against.
|
|
// A compilation error at this line likely means your copy of the
|
|
// proto package needs to be updated.
|
|
const _ = proto.ProtoPackageIsVersion2 // please upgrade the proto package
|
|
|
|
type EncryptedBlobInfo struct {
|
|
Ciphertext []byte `protobuf:"bytes,1,opt,name=ciphertext,proto3" json:"ciphertext,omitempty"`
|
|
IV []byte `protobuf:"bytes,2,opt,name=iv,proto3" json:"iv,omitempty"`
|
|
HMAC []byte `protobuf:"bytes,3,opt,name=hmac,proto3" json:"hmac,omitempty"`
|
|
Wrapped bool `protobuf:"varint,4,opt,name=wrapped,proto3" json:"wrapped,omitempty"`
|
|
KeyInfo *SealKeyInfo `protobuf:"bytes,5,opt,name=key_info,json=keyInfo,proto3" json:"key_info,omitempty"`
|
|
// Key is the Key value for the entry that corresponds to
|
|
// physical.Entry.Key's value
|
|
Key string `protobuf:"bytes,6,opt,name=key,proto3" json:"key,omitempty"`
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
XXX_unrecognized []byte `json:"-"`
|
|
XXX_sizecache int32 `json:"-"`
|
|
}
|
|
|
|
func (m *EncryptedBlobInfo) Reset() { *m = EncryptedBlobInfo{} }
|
|
func (m *EncryptedBlobInfo) String() string { return proto.CompactTextString(m) }
|
|
func (*EncryptedBlobInfo) ProtoMessage() {}
|
|
func (*EncryptedBlobInfo) Descriptor() ([]byte, []int) {
|
|
return fileDescriptor_deea33bd14ea5328, []int{0}
|
|
}
|
|
|
|
func (m *EncryptedBlobInfo) XXX_Unmarshal(b []byte) error {
|
|
return xxx_messageInfo_EncryptedBlobInfo.Unmarshal(m, b)
|
|
}
|
|
func (m *EncryptedBlobInfo) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
return xxx_messageInfo_EncryptedBlobInfo.Marshal(b, m, deterministic)
|
|
}
|
|
func (m *EncryptedBlobInfo) XXX_Merge(src proto.Message) {
|
|
xxx_messageInfo_EncryptedBlobInfo.Merge(m, src)
|
|
}
|
|
func (m *EncryptedBlobInfo) XXX_Size() int {
|
|
return xxx_messageInfo_EncryptedBlobInfo.Size(m)
|
|
}
|
|
func (m *EncryptedBlobInfo) XXX_DiscardUnknown() {
|
|
xxx_messageInfo_EncryptedBlobInfo.DiscardUnknown(m)
|
|
}
|
|
|
|
var xxx_messageInfo_EncryptedBlobInfo proto.InternalMessageInfo
|
|
|
|
func (m *EncryptedBlobInfo) GetCiphertext() []byte {
|
|
if m != nil {
|
|
return m.Ciphertext
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *EncryptedBlobInfo) GetIV() []byte {
|
|
if m != nil {
|
|
return m.IV
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *EncryptedBlobInfo) GetHMAC() []byte {
|
|
if m != nil {
|
|
return m.HMAC
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *EncryptedBlobInfo) GetWrapped() bool {
|
|
if m != nil {
|
|
return m.Wrapped
|
|
}
|
|
return false
|
|
}
|
|
|
|
func (m *EncryptedBlobInfo) GetKeyInfo() *SealKeyInfo {
|
|
if m != nil {
|
|
return m.KeyInfo
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *EncryptedBlobInfo) GetKey() string {
|
|
if m != nil {
|
|
return m.Key
|
|
}
|
|
return ""
|
|
}
|
|
|
|
// SealKeyInfo contains information regarding the seal used to encrypt the entry.
|
|
type SealKeyInfo struct {
|
|
// Mechanism is the method used by the seal to encrypt and sign the
|
|
// data as defined by the seal.
|
|
Mechanism uint64 `protobuf:"varint,1,opt,name=Mechanism,proto3" json:"Mechanism,omitempty"`
|
|
HMACMechanism uint64 `protobuf:"varint,2,opt,name=HMACMechanism,proto3" json:"HMACMechanism,omitempty"`
|
|
// This is an opaque ID used by the seal to identify the specific
|
|
// key to use as defined by the seal. This could be a version, key
|
|
// label, or something else.
|
|
KeyID string `protobuf:"bytes,3,opt,name=KeyID,proto3" json:"KeyID,omitempty"`
|
|
HMACKeyID string `protobuf:"bytes,4,opt,name=HMACKeyID,proto3" json:"HMACKeyID,omitempty"`
|
|
// These value are used when generating our own data encryption keys
|
|
// and encrypting them using the autoseal
|
|
WrappedKey []byte `protobuf:"bytes,5,opt,name=WrappedKey,proto3" json:"WrappedKey,omitempty"`
|
|
// Mechanism specific flags
|
|
Flags uint64 `protobuf:"varint,6,opt,name=Flags,proto3" json:"Flags,omitempty"`
|
|
XXX_NoUnkeyedLiteral struct{} `json:"-"`
|
|
XXX_unrecognized []byte `json:"-"`
|
|
XXX_sizecache int32 `json:"-"`
|
|
}
|
|
|
|
func (m *SealKeyInfo) Reset() { *m = SealKeyInfo{} }
|
|
func (m *SealKeyInfo) String() string { return proto.CompactTextString(m) }
|
|
func (*SealKeyInfo) ProtoMessage() {}
|
|
func (*SealKeyInfo) Descriptor() ([]byte, []int) {
|
|
return fileDescriptor_deea33bd14ea5328, []int{1}
|
|
}
|
|
|
|
func (m *SealKeyInfo) XXX_Unmarshal(b []byte) error {
|
|
return xxx_messageInfo_SealKeyInfo.Unmarshal(m, b)
|
|
}
|
|
func (m *SealKeyInfo) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
|
return xxx_messageInfo_SealKeyInfo.Marshal(b, m, deterministic)
|
|
}
|
|
func (m *SealKeyInfo) XXX_Merge(src proto.Message) {
|
|
xxx_messageInfo_SealKeyInfo.Merge(m, src)
|
|
}
|
|
func (m *SealKeyInfo) XXX_Size() int {
|
|
return xxx_messageInfo_SealKeyInfo.Size(m)
|
|
}
|
|
func (m *SealKeyInfo) XXX_DiscardUnknown() {
|
|
xxx_messageInfo_SealKeyInfo.DiscardUnknown(m)
|
|
}
|
|
|
|
var xxx_messageInfo_SealKeyInfo proto.InternalMessageInfo
|
|
|
|
func (m *SealKeyInfo) GetMechanism() uint64 {
|
|
if m != nil {
|
|
return m.Mechanism
|
|
}
|
|
return 0
|
|
}
|
|
|
|
func (m *SealKeyInfo) GetHMACMechanism() uint64 {
|
|
if m != nil {
|
|
return m.HMACMechanism
|
|
}
|
|
return 0
|
|
}
|
|
|
|
func (m *SealKeyInfo) GetKeyID() string {
|
|
if m != nil {
|
|
return m.KeyID
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func (m *SealKeyInfo) GetHMACKeyID() string {
|
|
if m != nil {
|
|
return m.HMACKeyID
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func (m *SealKeyInfo) GetWrappedKey() []byte {
|
|
if m != nil {
|
|
return m.WrappedKey
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (m *SealKeyInfo) GetFlags() uint64 {
|
|
if m != nil {
|
|
return m.Flags
|
|
}
|
|
return 0
|
|
}
|
|
|
|
func init() {
|
|
proto.RegisterType((*EncryptedBlobInfo)(nil), "physical.EncryptedBlobInfo")
|
|
proto.RegisterType((*SealKeyInfo)(nil), "physical.SealKeyInfo")
|
|
}
|
|
|
|
func init() { proto.RegisterFile("physical/types.proto", fileDescriptor_deea33bd14ea5328) }
|
|
|
|
var fileDescriptor_deea33bd14ea5328 = []byte{
|
|
// 312 bytes of a gzipped FileDescriptorProto
|
|
0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x54, 0x91, 0x5f, 0x4b, 0xc3, 0x30,
|
|
0x14, 0xc5, 0x69, 0xd7, 0xfd, 0xbb, 0x9b, 0xa2, 0x61, 0x42, 0x1e, 0x44, 0xca, 0x54, 0xe8, 0x53,
|
|
0x2b, 0xfa, 0x09, 0x9c, 0x7f, 0x50, 0xc6, 0x5e, 0xe2, 0x83, 0xe0, 0x8b, 0x64, 0x59, 0xb6, 0x84,
|
|
0x75, 0x4d, 0x68, 0xb3, 0x69, 0x3e, 0x98, 0x4f, 0x7e, 0x39, 0x49, 0x4a, 0xd9, 0x7c, 0xbb, 0xf7,
|
|
0x97, 0xc3, 0xe1, 0x9c, 0x1b, 0x18, 0x69, 0x61, 0x2b, 0xc9, 0x68, 0x9e, 0x19, 0xab, 0x79, 0x95,
|
|
0xea, 0x52, 0x19, 0x85, 0x7a, 0x0d, 0x1d, 0xff, 0x04, 0x70, 0xfa, 0x54, 0xb0, 0xd2, 0x6a, 0xc3,
|
|
0x17, 0x93, 0x5c, 0xcd, 0x5f, 0x8b, 0xa5, 0x42, 0x17, 0x00, 0x4c, 0x6a, 0xc1, 0x4b, 0xc3, 0xbf,
|
|
0x0d, 0x0e, 0xe2, 0x20, 0x19, 0x92, 0x03, 0x82, 0x8e, 0x21, 0x94, 0x3b, 0x1c, 0x7a, 0x1e, 0xca,
|
|
0x1d, 0x42, 0x10, 0x89, 0x0d, 0x65, 0xb8, 0xe5, 0x89, 0x9f, 0x11, 0x86, 0xee, 0x57, 0x49, 0xb5,
|
|
0xe6, 0x0b, 0x1c, 0xc5, 0x41, 0xd2, 0x23, 0xcd, 0x8a, 0x6e, 0xa0, 0xb7, 0xe6, 0xf6, 0x53, 0x16,
|
|
0x4b, 0x85, 0xdb, 0x71, 0x90, 0x0c, 0x6e, 0xcf, 0xd2, 0x26, 0x50, 0xfa, 0xc6, 0x69, 0x3e, 0xe5,
|
|
0xd6, 0xc5, 0x20, 0xdd, 0x75, 0x3d, 0xa0, 0x13, 0x68, 0xad, 0xb9, 0xc5, 0x9d, 0x38, 0x48, 0xfa,
|
|
0xc4, 0x8d, 0xe3, 0xdf, 0x00, 0x06, 0x07, 0x52, 0x74, 0x0e, 0xfd, 0x19, 0x67, 0x82, 0x16, 0xb2,
|
|
0xda, 0xf8, 0xc0, 0x11, 0xd9, 0x03, 0x74, 0x05, 0x47, 0x2f, 0xb3, 0xfb, 0x87, 0xbd, 0x22, 0xf4,
|
|
0x8a, 0xff, 0x10, 0x8d, 0xa0, 0xed, 0xec, 0x1e, 0x7d, 0x8d, 0x3e, 0xa9, 0x17, 0xe7, 0xec, 0x64,
|
|
0xf5, 0x4b, 0xe4, 0x5f, 0xf6, 0xc0, 0x5d, 0xea, 0xbd, 0xae, 0x35, 0xe5, 0xd6, 0xb7, 0x19, 0x92,
|
|
0x03, 0xe2, 0x3c, 0x9f, 0x73, 0xba, 0xaa, 0x7c, 0xf6, 0x88, 0xd4, 0xcb, 0xe4, 0xfa, 0xe3, 0x72,
|
|
0x25, 0x8d, 0xd8, 0xce, 0x53, 0xa6, 0x36, 0x99, 0xa0, 0x95, 0x90, 0x4c, 0x95, 0x3a, 0xdb, 0xd1,
|
|
0x6d, 0x6e, 0xb2, 0xe6, 0x16, 0xf3, 0x8e, 0xff, 0xad, 0xbb, 0xbf, 0x00, 0x00, 0x00, 0xff, 0xff,
|
|
0x01, 0x95, 0xea, 0x9d, 0xc5, 0x01, 0x00, 0x00,
|
|
}
|